The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Amr M. Youssef: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Amr M. Youssef, Guang Gong
    Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:15-20 [Conf]
  2. Amr M. Youssef, Guang Gong
    Hyper-bent Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:406-419 [Conf]
  3. Amr M. Youssef, Guang Gong
    On the Interpolation Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:109-120 [Conf]
  4. Amr M. Youssef, Guang Gong
    Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:214-222 [Conf]
  5. Amr M. Youssef, Stafford E. Tavares
    Information Leakage of a Randomly Selected Boolean Function. [Citation Graph (0, 0)][DBLP]
    Information Theory and Applications, 1995, pp:41-52 [Conf]
  6. Guang Gong, Amr M. Youssef
    On Welch-Gong Transformation Sequence Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:217-232 [Conf]
  7. Amr M. Youssef
    Cryptanalysis of the ``Augmented Family of Cryptographic Parity Circuits'' Proposed at ISW'97. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:29-38 [Conf]
  8. Amr M. Youssef, Guang Gong
    Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:49-59 [Conf]
  9. Amr M. Youssef, Stafford E. Tavares
    Affine equivalence in the AES round function. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2005, v:148, n:2, pp:161-170 [Journal]
  10. Amr M. Youssef, Stafford E. Tavares, Guang Gong
    On some probabilistic approximations for AES-like s-boxes. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2006, v:306, n:16, pp:2016-2020 [Journal]
  11. Amr M. Youssef, Stafford E. Tavares
    Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:56, n:5, pp:249-252 [Journal]
  12. Amr M. Youssef, Stafford E. Tavares
    Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion". [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:60, n:5, pp:271-275 [Journal]
  13. Guang Gong, Amr M. Youssef
    Cryptographic properties of the Welch-Gong transformation sequence generators. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2837-2846 [Journal]
  14. Z. Saber, Mohammad Faisal Uddin, Amr M. Youssef
    On the existence of (9, 3, 5, 240) resilient functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2269-2270 [Journal]
  15. Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
    Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:177-193 [Conf]
  16. Ren Wang, Amr M. Youssef, Ahmed K. Elhakeem
    Artificial life feature selection techniques for spam e-mail filters. [Citation Graph (0, 0)][DBLP]
    Computational Intelligence, 2006, pp:102-107 [Conf]
  17. Ren Wang, Amr M. Youssef, Ahmed K. Elhakeem
    On Some Feature Selection Strategies for Spam Filter Design. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:2186-2189 [Conf]
  18. Mohammad Faisal Uddin, Amr M. Youssef
    An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:1582-1585 [Conf]

  19. Differential Fault Analysis of Rabbit. [Citation Graph (, )][DBLP]


  20. Differential Fault Analysis of HC-128. [Citation Graph (, )][DBLP]


  21. A Related-Key Attack on TREYFER. [Citation Graph (, )][DBLP]


  22. A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002